Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged states

Rss Feed Group items tagged

Anne Bubnic

No bullies allowed [Pennsylvania State Initiative] - 0 views

  • A school must have a written bullying policy that includes consequences for violations, identify school personnel to notify with complaints and the policy must be posted in every classroom and be reviewed by students, according to a press release issued by Williams' office.
  • And while school violence had declined 4 percent during the past several years, bullying in schools has risen 5 percent, according to the U.S. Department of Education.
  • The new legislation applies to any threats or intimidation in a school setting, including on school grounds, on a school bus or at any school-sponsored event. Also, the measure covers threats sent via e-mail or over the Internet, called cyber bullying. According to the state Department of Education, every school day 160,000 students miss school because they are afraid of being bullied.
  • ...1 more annotation...
  • The anti-bully measure was included in a larger School Code bill in 2008. Greenleaf said he proposed the measure back in 2002, but met with resistance from school districts who worried about the cost of implementing such a program.
  •  
    A bill passed earlier this year makes it mandatory for Pennsylvania school districts to have a written anti-bullying policy in place beginning next year.
Anne Bubnic

Governor Signs Law To Educate Children On Internet Safety [Illinois] - 0 views

  • he new law takes effect January 1st and provides that the Internet safety curriculums in schools will begin with the 2009-2010 school year. The bill allows the age-appropriate unit of instruction to be incorporated into the current courses of study regularly taught in the districts’ schools.
  • Illinois’ partnership with the Netsmartz national Internet safety program was a Governor’s initiative that was launched in 2006.
  • Earlier this week, Governor Blagojevich signed into law the state’s new Cyberbullying law. It clarifies the definition of harassing someone by using electronic communication such as the Internet and text messaging and enables the prosecution of someone who anonymously bullies in this capacity.
  •  
    Governor Rod Blagojevich Thursday signed Senate Bill 2512 legislation to help protect children from the dangers of the Internet. SB 2512 requires school districts, beginning in the 2009-2010 school year, to incorporate an "age-appropriate Internet safety unit of instruction in the current course of study regularly taught in the district's schools," beginning in third grade.
Anne Bubnic

Missouri governor signs Internet harassment bill - 0 views

  •  
    Missouri Gov. Matt Blunt signed a bill Monday outlawing cyberbullying, just miles from where a 13-year-old girl committed suicide nearly two years ago after being harassed on the Internet.\n\nThe bill updates state laws against harassment by removing the requirement that the communication be written or over the telephone. Supporters say the bill now covers harassment from computers, text messages and other electronic devices.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Students say cyberbullying can be the worst kind - 0 views

  •  
    A group of freshmen from Scituate High, who recently talked about cyberbullying with a reporter, said it's a real problem and more than a buzzword. And school officials may have to do something about it if an anti-bullying bill approved by the state Senate on Thursday is signed into law.
Anne Bubnic

FL State lawmakers consider going easier on sexting teens - 0 views

  •  
    Florida State lawmakers Monday took up a bill that would, for the first time, create a separate penalty for the increasingly common, and risqué, practice among teens - sending naked or suggestive pictures of themselves via cell phone or e-mail.
Anne Bubnic

21st-Century Skills: Evidence, Relevance, and Effectiveness - 3 views

  •  
    Several states have taken the NETS standards one to several steps further in identifying what K-12 education must achieve in terms of facilitating student proficiency in the defined skills. These efforts have, in some cases, led to standards being issued by each state for its own students to meet
  •  
    This has great resources. I'm very excited to see New Jersey's focus on Career and Life Skills. However, not seeing the same focus in other states has me wishing for national standards.
adjustingto6figu

The Top 5 States Afflicted by Natural Disasters - 0 views

"Many areas in the United States are affected by natural disasters at various times of the year. However, there are a few states where natural disasters seem to occur more often. These areas have h...

claims adjusters property adjuster insurance catastrophe cat independent life field staff natural disaster management

started by adjustingto6figu on 21 Jul 17 no follow-up yet
aghora group

MEP Training - Employment : Education - 0 views

  •  
    Aghora Design Academy is a training Institute run by Aghora Infrastructure Pvt. Ltd.The academy was entrusted with the responsibility of developing the new generation of technical manpower that can spearhead the industrial development of the state.Aghora Design Academy has been envisaged to be the grooming ground for the future engineers ,designers and researcers.
Anne Bubnic

China: Explosions In The Distance - 0 views

  • A greater proportion (than in the West) of Chinese users get online via Internet cafes or from work. China's Internet environment is much different than the American one. The Chinese Internet is heavily policed, with over 30,000 cyber cops blocking content that is considered hostile to the communist dictatorship that has run the country for the last 60 years.
  • Chinese who say the wrong thing on message boards, chat rooms or email, are subject to detection and punishment.
  • ot so much for cyber criminals. Some 52 percent of the Internet based criminality can be traced to China (versus 21 percent to the United States). It is believed that the Chinese government tolerates the cyber criminals, as long as these black hat geeks do espionage, and Cyber War tasks for the government.
  • ...1 more annotation...
  • A greater proportion (than in the West) of Chinese users get online via Internet cafes or from work. China's Internet environment is much different than the American one. The Chinese Internet is heavily policed, with over 30,000 cyber cops blocking content that is considered hostile to the communist dictatorship that has run the country for the last 60 years. Chinese who say the wrong thing on message boards, chat rooms or email, are subject to detection and punishment. Not so much for cyber criminals. Some 52 percent of the Internet based criminality can be traced to China (versus 21 percent to the United States). It is believed that the Chinese government tolerates the cyber criminals, as long as these black hat geeks do espionage, and Cyber War tasks for the government.
  •  
    China now has the largest Internet population, with 253 million users. The U.S. is second with 223 million users. While 70 percent of Americans are online, only about 20 percent of Chinese are. Current growth trends indicate that, in the next few years,
Anne Bubnic

America's Libraries adapted to digital age - 0 views

  • As a group, libraries have embraced the digital age," said Lee Rainie, founding director of the Pew Internet & American Life Project, which has surveyed public attitudes toward libraries. "They've added collections, added software and hardware, upgraded the skills of their staff. A lot of institutions have had to change in the Internet age, but libraries still have a very robust and large constituency." A December 2007 Pew survey found that more than half of Americans — 53% — visited a library in the past year. That's expected to grow as more people look for free resources and entertainment in a slowing economy.
  • At the one-room Watha T. Daniel/Shaw Interim Library in the District of Columbia, books still line the shelves. But on one recent day, almost every adult at the library sat in front of a computer, surfing the Web, checking e-mail or visiting a social networking site.
  • The analysis found that libraries are thriving in the Internet age: •Attendance increased roughly 10% between 2002 and 2006 to about 1.3 billion. Regionally, Southern states lag the rest of the country in visits per capita. •Circulation, which measures how often library visitors check out print or electronic materials, increased about 9%, from 1.66 billion to 1.81 billion during the five-year period.
  • ...2 more annotations...
  • •The number of Internet-capable computers soared 39% — from about 137,000 in 2002 to nearly 190,000 in 2006. Libraries in rural states in New England and the Midwest led the country in public computers per capita in 2006. The increase in Internet access is thanks in part to the Bill & Melinda Gates Foundation, which launched a national program in 1997 to bring the Internet to libraries, beginning with the South. By 2003, the foundation had spent $250 million on some 47,000 computers, as well as training and tech support, bringing almost every public library online, said Jill Nishi, deputy director of the foundation's U.S. Libraries initiative. "You should be able to walk into any library and find Internet service," she said. "It's free, unfettered access to information."
  • Free Internet access is particularly important for low-income people, said Ken Flamm, an economics professor at the University of Texas at Austin who has studied the role of the Internet in public libraries. Only about a third of households with incomes below $25,000 have Internet access, according to federal data.
  •  
    The Internet was supposed to send America's public libraries the way of eight-track tapes and pay phones. But it turns out, they're busier than ever. Libraries have transformed themselves from staid, sleepy institutions into hip community centers offering
Anne Bubnic

AB 307: California Education Code Section 51871.5 - 0 views

  •  
    California State-approved technology plans that meet certain criteria must be in place before federal funding for technology may be secured by a school district. Education Code Section 51871.5 also requires the addition of a component to educate students and teachers on cyberbullying and Internet Safety, among other topics.
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

California Assembly Bill 86 - 0 views

  •  
    Existing law, the Interagency School Safety Demonstration Act of 1985, states that the intent of the Legislature in enacting its provisions is to encourage school districts, county offices of education, law enforcement agencies, and agencies serving youth to develop and implement interagency strategies, in-service training programs, and activities that will, among other things, reduce school crime and violence, including bullying. Existing law establishes the School/Law Enforcement Partnership and charges it with undertaking several efforts intended to reduce school crime, as specified,including bullying.

    This bill would specify that bullying, as used in these provisions,means one or more acts by a pupil or a group of pupils directed against another pupil that constitutes sexual harassment, hate violence, or severe or pervasive intentional harassment, threats, or intimidation that is disruptive, causes disorder, and invades the rights of others by creating an intimidating or hostile educational environment, and includes\nacts that are committed personally or by means of an electronic act, as defined.

    Existing law prohibits the suspension, or recommendation for expulsion, of a pupil from school unless the principal determines that the pupil has committed any of various specified acts, including, but not limited to, hazing, as defined. This bill, in addition, would give school officials grounds to suspend a pupil or recommend a pupil for expulsion for bullying, including, but not limited to, bullying by electronic act.

Anne Bubnic

The Newest Breed of Bully, the Cyberbully - 0 views

  • While some of what is published online may seem libelous (i.e., intended to harm the reputation of another), proving that point can be difficult and expensive. In order to prove libel, you have to prove malicious intent, something that might prove difficult if the offending Web page was put up by an adolescent. And many times, freedom of speech wins out.
  • Unless an actual crime has taken place, law enforcement officials often are unable to arrest anyone, even if they can identify the culprit. According to Lt. John Otero, commanding officer of the computer crime squad for the New York City Police Department, individuals would actually have to post a direct threat in order for the police to act. "For example, if they say, 'tomorrow I am going to hurt, kill, or injure an individual,' that would constitute a crime," he explains. A person posting such a threat could be arrested and charged with aggravated harassment. Although Otero says his department has seen some arrests, anyone under the age of 18 would not be dealt with harshly: "If the kid is too young, he would get a scolding and the incident would be brought to the parents' attention; if they are under 16, they are considered minors."
  • Like cliques, cyberbullying reaches its peak in middle school, when young adolescents are trying to figure out who their friends are and whether they fit in. "Third- and 4th-graders are just having fun with computers," says Loretta Radice, who taught computer skills to middle-schoolers in public and private schools for more than 15 years.
  • ...1 more annotation...
  • While the cyber- bully believes he cannot be caught, Radice notes that everyone leaves footsteps in cyberspace. "Everything is traceable," she says. "Kids often don't realize that."
  •  
    Because cyberbullying is such a new phenomenon, school and law enforcement officials in the United States and other countries are still sorting out the legal technicalities. "Most of what is done online is protected as free speech," says Frannie Wellings, policy fellow at the Electronic Privacy Information Center in Washington, DC.
Anne Bubnic

Schools Must Deal with Students Who Use Cyberspace for Bullying - 0 views

  •  
    Ohio State Bar Association questions and answers on cyberbullying in the schools.
Anne Bubnic

SB 818: Missouri Governor Signs Cyber-Bullying Bill into Law - 0 views

  • The Governor signed the bill at a library in St. Charles County, not far from the neighborhood where a 13-year-old girl, Megan Meier, hanged herself in 2006 after receiving taunting messages over the Internet.  The law was passed after the national outcry that followed the suicide of Meier
  • When the full story came to light, and public demand grew for the mother's prosecution, it turned out that what Ms. Drew had done, while clearly malicious, was not against the law as the Missouri Statutes were then written. So the Missouri Legislature and Governor Blunt decided to correct this problem. The new law adds to unlawful harassment electronic means of communication.
  • The new law penalizes those who knowingly communicate with another person who is, or who purports to be, seventeen years of age or younger and recklessly frightens, intimidates, or causes emotional distress to such other person.  Also, the new law makes it a crime "to engage, without good cause, in any other act with the purpose to frighten, intimidate, or cause emotional distress to another person, cause such person to be frightened, intimidated, or emotionally distressed, and such person's response to the act is one of a person of average sensibilities considering the person's age."
  •  
    On June 30th, Missouri governor, Matt Blunt, signed a bill updating state laws against harassment by removing the requirement in the legislation requiring that such harassing communication be written or made over the telephone. Now, harassment from computers, text messages and other electronic devices may also be considered illegal. The amended law also requires school boards to create a written policy requiring schools to report harassment and stalking committed on school property to local police, including such done via the Internet.
Anne Bubnic

The Impact of Cyberbullying [PDF] - 0 views

  •  
    2005 Report by Dr. Beth Manke, Associate Professor, Human Development, California State University, Long Beach. Often the most dramatic incidents of cyberbullying get the attention of educators, parents and the authority. Those incidents that involve threats, particularly death threats and those that result in school shootings and suicide attempts prompt intervention for both the perpetrators and victims. We must remember, however, that all cyberbullying, even the less dramatic incidents including the spreading of rumors and saying mean things online can be harmful as they can erode a child's self esteem and confidence and lead to later academic difficulties, interpersonal problems and psychological distress.
Anne Bubnic

Cyber Bullying Presents a Complex Legal Landscape - 0 views

  • Cyber bullying conducted at school allows school authorities to more easily impose discipline. The use of school equipment to cyber bully also makes a stronger legal argument for action by the school. And if the student e-mails offensive speech to school or downloads it at school and then distributes it, the school is in an advantageous position regarding disciplining the student. However, speech created at home—such as the creation of a Web site—affords greater legal protection for cyber bullies.
  • “The problem with the approach that web speech created at home can—if accessed at school—become school speech that can be regulated is the very nature of the Internet. Once something is created and placed on the Internet, the author loses control over who can access the speech and where it can be accessed.”
  •  
    As students across the country return to school, school districts face an often complicated and confusing legal landscape on how to deal with cyber bullies in their schools, according to Todd DeMitchell, EdD, a professor of education, who studies school liability, adequate supervision, and responses to preventing bullying and cyber bullying from school administrators and state legislatures.
Anne Bubnic

'Video-Gaming' Child Predators Offering Points For Nude Photos - 0 views

  • Maurer is warning parents to take precautions when it comes to gaming consoles because most are hooked to the Internet and anyone can be chatting with children during game play. IBSYS.ad.AdManager.registerPosition({ "iframe": false, "addlSz": "", "element": "ad_N6C0061.2D12", "interstitials": false, "beginDate": "", "endDate": "", "getSect": "", "name": "square", "qString": "", "width": "300", "height": "250", "section": "", "useId": "16995600", "interactive": false, "useSameCategory": false, "topic": "", "swSectionRoot": "", "useZone": "", "type": "DOM" }); "My theory on it is that predators are going to go where kids are, and kids are playing video games so it's a perfect place for them to be," Maurer said.
  •  
    Child predators offering game points in exchange for nude images through Internet-connected video games have prompted a warning for parents. "Kids are playing games, and they are being asked to take photos of themselves naked in order to get game points," state attorney Cybercrime Detective Lt. David Maurer said. "There is not only the chatting version of the games but also a webcam involved."
‹ Previous 21 - 40 of 143 Next › Last »
Showing 20 items per page